GHSA-2c7c-3mj9-8fqh

Suggest an improvement
Source
https://github.com/advisories/GHSA-2c7c-3mj9-8fqh
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/11/GHSA-2c7c-3mj9-8fqh/GHSA-2c7c-3mj9-8fqh.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-2c7c-3mj9-8fqh
Aliases
Related
Published
2023-11-21T22:17:19Z
Modified
2024-05-20T21:57:47Z
Summary
Decryption of malicious PBES2 JWE objects can consume unbounded system resources
Details

The go-jose package is subject to a "billion hashes attack" causing denial-of-service when decrypting JWE inputs. This occurs when an attacker can provide a PBES2 encrypted JWE blob with a very large p2c value that, when decrypted, produces a denial-of-service.

Database specific
{
    "nvd_published_at": null,
    "cwe_ids": [
        "CWE-400"
    ],
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2023-11-21T22:17:19Z"
}
References

Affected packages

Go / github.com/go-jose/go-jose/v3

Package

Name
github.com/go-jose/go-jose/v3
View open source insights on deps.dev
Purl
pkg:golang/github.com/go-jose/go-jose/v3

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.0.1

Go / github.com/square/go-jose

Package

Name
github.com/square/go-jose
View open source insights on deps.dev
Purl
pkg:golang/github.com/square/go-jose

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.6.2